Search Results - (( developing security window algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- window algorithm »
- java implication »
- security window »
-
1
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
Get full text
Get full text
Student Project -
2
Encryption Technology on Windows Workstation
Published 2004“…This paper discusses the development of a new method for encrypting text of information in Microsoft Windows environment. …”
Get full text
Get full text
Final Year Project -
3
VMware as an Intermediate Platform between Windows 7 and Linux Fedora 15 for Real-Time Malaysian Sign Language Translator
Published 2014“…Therefore, a client/server technology has secured much time during the MSL recognition system development and helped in terms of algorithms enhancement…”
Get full text
Get full text
Proceeding Paper -
4
VMware as an intermediate platform between Windows 7 and Linux Fedora 15 for real-time Malaysian sign language translator
Published 2014“…Therefore, a client/server technology has secured much time during the MSL recognition system development and helped in terms of algorithms enhancement.…”
Get full text
Get full text
Get full text
Article -
5
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
Published 2022“…The amount of data type evidence collections and security measures to secure the integrity of evidence collected are measured by evaluating available tools, developing a proof-of-concept toolkit, and comparingfunctioning tools. …”
Get full text
Get full text
Article -
6
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…While the Isolation Forest (iForest) anomaly detection algorithm has a linear time complexity and low memory requirement, iForestASD adapts iForest by employing a sliding window that introduces the ability to handle concept drift, which is often characteristic of streaming data such as CAN bus traffic. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…The use of the SHA-256 hash algorithm currently considered secure and resistant to collision attacks. …”
Get full text
Get full text
Get full text
Article -
8
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…This study was solely concerned with the Windows malware dataset. The malware classification was determined by testing and training the supervised ML algorithms using the extracted features from the malware dataset. …”
Get full text
Get full text
Get full text
Article -
9
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…So that, the access control will be more secure. It also allow for further research and development on the same or new approach. …”
Get full text
Get full text
Thesis -
10
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…By combining the proposed scalar arithmetic and the new point arithmetic 5P, a new scalar multiplication algorithm was developed. This scalar multiplication algorithm is named Q-NAF scalar multiplication for binary curve over Lopez-Dahab coordinates. …”
Get full text
Get full text
Thesis -
11
Botnet detection using automated script / Norfathin Rosli
Published 2020“…This paper is about a Botnet Detection using Automated Script, the programming language is and the operating system is Windows 7. The project is dedicated for Network and Security Analyst to develop better algorithm for botnet detect and prevents. …”
Get full text
Get full text
Thesis -
12
-
13
Genetic algorithm for event scheduling system
Published 2010“…There are four main interfaces that ask for login information, add, edit and view events details. As for the development environment, UTeM-EAS is developed and to run in windows XP with support of Adobe Dreamweaver and MS SQL Server. …”
Get full text
Get full text
Get full text
Article -
14
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Finally, we study the provable security element for both cryptosystems. Emphasis is given to the standard security goal and the strong attack model, namely the indistinguishability and the chosen-ciphertext attack, respectively.…”
Get full text
Get full text
Thesis -
15
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
